Method for realizing information transmission security based on digital envelope technology

A digital envelope and information transmission technology, applied in the field of information security, can solve problems such as time-consuming and laborious, uneven technical strength of partners, and high cost of program management and maintenance, so as to reduce resource consumption, solve platform inconsistencies, and improve information transmission speed effect

Pending Publication Date: 2018-10-19
CHINA CONSTRUCTION BANK
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when banks and business partners exchange information, there are often disagreements over which technology should be used by the two parties to solve network transmission security. According to the requirements of the bank, generally try to use the security components of the bank to solve the transmission security problem. However, in reality, often due to the other party using Platform, version, programming language, program code disclosure, installation configuration, daily maintenance and upgrade, etc. cannot use the bank's security components
For example, some partners require that the security module must have source code, and some partners’ platform version does not match the version of the security component provided by the bank, and the technical strength of the partners is uneven. If problems occur during operation, the bank needs to provide maintenance
If the two parties negotiate to develop a new security module, on the one hand, each partner needs to develop it once, which is time-consuming and laborious; on the other hand, the two-two negotiation mode makes each party have different programs for different partners, and the management and maintenance of multiple programs is very costly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information transmission security based on digital envelope technology
  • Method for realizing information transmission security based on digital envelope technology
  • Method for realizing information transmission security based on digital envelope technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The embodiments of the present invention will be further described below. The following examples only further illustrate the present application, and should not be construed as limiting the present application.

[0032] This embodiment is a method for realizing information transmission security based on digital envelope technology, and the specific implementation steps are as follows:

[0033] Such as figure 1 As shown, the plaintext of user A's information is encrypted to output information ciphertext, symmetric algorithm key ciphertext, hash value ciphertext of information plaintext, and user A's public key is processed by digital envelope technology and then transmitted to user B through the network;

[0034] User B receives the input encapsulated by digital envelope technology: information ciphertext, symmetric algorithm key ciphertext, hash value ciphertext of information plaintext and user A's public key, and performs decryption processing to output the informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing information transmission security based on digital envelope technology. The method comprises the following steps: information plaintext of a user A is subjected to data encryption to output information ciphertext, symmetric algorithm key ciphertext, hash value ciphertext of information plaintext and user A public key which are processed by the digitalenvelope technology and then transmitted to a user B through a network; the user B receives inputs encapsulated by the digital envelope technology: information ciphertext, symmetric algorithm key ciphertext, hash value ciphertext of information plaintext and user A public key, and performs decryption to output information plaintext and hash value of information plaintext sent from the user A; andthe received information plaintext is subjected to hash calculation to obtain a hash value, and two hash values are compared to determine whether the information transmission is successful. The invention adopts the digital envelope technology to solve key exchange, synchronization and management problems, in real-time transactions, a large amount of information is encrypted by symmetric algorithm, and only a small number of symmetric encryption algorithm keys are encrypted and decrypted by asymmetric algorithm for exchanging keys and verifying the authenticity of information, which improves the speed of information transmission and reduces the consumption of resources.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a method for realizing information transmission security based on digital envelope technology. Background technique [0002] With the rapid development of information technology, more and more businesses have migrated from offline to online. When conducting online business, there will be a large amount of information exchange. For this reason, it is necessary to adopt reliable transmission security technology to ensure the authenticity, confidentiality and reliable source of information. [0003] At present, when banks and business partners exchange information, there are often disagreements over which technology should be used by the two parties to solve network transmission security. According to the requirements of the bank, generally try to use the security components of the bank to solve the transmission security problem, but in reality, often due to the other p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/32
CPCH04L9/0643H04L9/3247H04L63/045Y02D30/50
Inventor 孙向东刘红刚徐松文叶剑青
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products